How hacking could change history

Although hacking began as simple entertainment for a group of enthusiastic young people, much has changed since then. Today, all countries have, to a greater or lesser extent, a response or attack group of this type. The clearest examples would

All that glitters is not cryptomining, but almost

There is a new trend in the world of malware, called cryptojacking. In many wars they used enemy prisoners to mine minerals, this would be similar to this case but transferred to the 21st century. It consists in using the

A simple click can generate a logic explosion

Not all malware executes its malicious payload instantly as soon as they are downloaded and executed for the first time. Many times, these are kept in the shadow and are triggered only when a certain situation occurs (something like an

Everything started with the USB of that hacker

When someone finds out that your computer is infected, a question automatically pops up in your mind, how has this happened? First you think about the recent files downloaded / installed, then in the visited pages, and if no answer

Spear Phishing, adapting hooks to targets

Although many of you may have heard of phising, even been victims of some in the worst case, you are not so familiar with the next evolutionary step: spear phishing. Starting from the ground up, phishing is based on fooling

That malware knows that they are watching it

It is extremely common for advanced malware not only to hide its code with different packers, but also to try to detect if it is being analyzed dynamically through a sandbox. If they realize that they are watching it, they

PackerInspector

Our sandbox for packers

Categories